Fake site offers malicious 7-Zip installer with malware

A fake website is distributing a malicious version of the 7-Zip installer that contains malware. TechRadar warns users that the .com domain is not the official site for 7-Zip. The alert was published on February 11, 2026.

TechRadar has issued a warning about a fraudulent website mimicking the popular file archiver 7-Zip. The site offers a download for what appears to be the legitimate 7-Zip software but is actually laced with malware.

According to the report, users should be cautious because the .com domain—specifically 7zip.com—is not affiliated with the official 7-Zip project. The official website for 7-Zip is hosted elsewhere, and downloading from unverified sources can lead to security risks.

The publication date of this security advisory is February 11, 2026, at 14:55 UTC. No further details on the specific malware or affected versions were provided in the source material.

This incident highlights the importance of verifying software sources before installation to avoid potential threats.

Awọn iroyin ti o ni ibatan

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
Àwòrán tí AI ṣe

Attackers hijack Linux Snap Store apps to steal crypto phrases

Ti AI ṣe iroyin Àwòrán tí AI ṣe

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Attackers have exploited the .arpa internet domain to host malicious websites and deliver phishing links. They use IPv6 and hidden .arpa addresses to disguise URLs and steal user credentials. The scheme was reported by TechRadar on March 2, 2026.

Ti AI ṣe iroyin

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

Ti AI ṣe iroyin

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

A vulnerability in a popular WordPress quiz plugin has impacted over 40,000 sites, allowing potential SQL injection attacks. Security researchers have identified the flaw, urging site owners to check for exposure. The issue was reported on February 4, 2026.

Ti AI ṣe iroyin

Digital squatting has reached new heights as hackers increasingly impersonate brands through domain attacks. This form of cyber impersonation takes various shapes to deceive users and organizations. The trend highlights ongoing challenges in online security.

 

 

 

Ojú-ìwé yìí nlo kuki

A nlo kuki fun itupalẹ lati mu ilọsiwaju wa. Ka ìlànà àṣírí wa fun alaye siwaju sii.
Kọ